Book picks similar to
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics by Ben Buchanan
cyber
technology
cybersecurity
non-fiction
Trust Me, I'm Lying: Confessions of a Media Manipulator
Ryan Holiday - 2012
A malicious online rumor costs a company millions. A political sideshow derails the national news cycle and destroys a candidate. Some product or celebrity zooms from total obscurity to viral sensation. What you don't know is that someone is responsible for all this. Usually, someone like me.I'm a media manipulator. In a world where blogs control and distort the news, my job is to control blogs--as much as any one person can. In today's culture... 1) Blogs like "Gawker," "Buzzfeed" and the "Huffington Post" drive the media agenda. 2) Bloggers are slaves to money, technology, and deadlines. 3) Manipulators wield these levers to shape everything you read, see and watch--online and off.Why am I giving away these secrets? Because I'm tired of a world where blogs take indirect bribes, marketers help write the news, reckless journalists spread lies, and no one is accountable for any of it. I'm pulling back the curtain because I don't want anyone else to get blindsided. I'm going to explain exactly how the media "really" works. What you choose to do with this information is up to you.
The Party: The Secret World of China's Communist Rulers
Richard McGregor - 2010
The country has undergone a remarkable transformation on a scale similar to that of the Industrial Revolution in the West. The most remarkable part of this transformation, however, has been left largely untold—the central role of the Chinese Communist Party. As an organization alone, the Party is a phenomenon of unique scale and power. Its membership surpasses seventy-three million, and it does more than just rule a country. The Party not only has a grip on every aspect of government, from the largest, richest cities to the smallest far-flung villages in Tibet and Xinjiang, it also has a hold on all official religions, the media, and the military. The Party presides over large, wealthy state-owned businesses, and it exercises control over the selection of senior executives of all government companies, many of which are in the top tier of the Fortune 500 list. In The Party, Richard McGregor delves deeply into China's inner sanctum for the first time, showing how the Communist Party controls the government, courts, media, and military, and how it keeps all corruption accusations against its members in-house. The Party's decisions have a global impact, yet the CPC remains a deeply secretive body, hostile to the law, unaccountable to anyone or anything other than its own internal tribunals. It is the world's only geopolitical rival of the United States, and is steadfastly poised to think the worst of the West. In this provocative and illuminating account, Richard McGregor offers a captivating portrait of China's Communist Party, its grip on power and control over China, and its future.
Inside Terrorism
Bruce Hoffman - 1998
In this revised edition of the classic text, Hoffman analyzes the new adversaries, motivations, and tactics of global terrorism that have emerged in recent years, focusing specifically on how al Qaeda has changed since 9/11; the reasons behind its resiliency, resonance, and longevity; and its successful use of the Internet and videotapes to build public support and gain new recruits. Hoffman broadens the discussion by evaluating the potential repercussions of the Iraqi insurgency, the use of suicide bombers, terrorist exploitation of new communications media, and the likelihood of a chemical, biological, radiological, or nuclear terrorist strike.Closer to home, Hoffman reconsiders the Timothy McVeigh case and the threats posed by American Christian white supremacists and abortion opponents as well as those posed by militant environmentalists and animal rights activists. He argues that the attacks on the World Trade Center fundamentally transformed the West's view of the terrorist threat. More relevant and necessary than ever, Inside Terrorism continues to be the definitive work on the history and future of global terrorism.
Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda
Robert Wallace - 2008
It is a world where the intrigue of reality exceeds that of fiction. What is an invisible photo used for? What does it take to build a quiet helicopter? How does one embed a listening device in a cat? If these sound like challenges for Q, James Bondas fictional gadget-master, think again. Theyare all real-life devices created by the CIAas Office of Technical Serviceaan ultrasecretive department that combines the marvels of state-of-the-art technology with the time-proven traditions of classic espionage. And now, in the first book ever written about this office, the former director of OTS teams up with an internationally renowned intelligence historian to take readers into the laboratory of espionage. Spycraft tells amazing life and death stories about this littleknown group, much of it never before revealed. Against the backdrop of some of Americaas most critical periods in recent historyaincluding the Cold War, the Cuban Missile Crisis, and the war on terrorathe authors show the real technical and human story of how the CIA carries out its missions.
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith - 2007
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index
The Quick Python Book
Naomi R. Ceder - 2000
This updated edition includes all the changes in Python 3, itself a significant shift from earlier versions of Python.The book begins with basic but useful programs that teach the core features of syntax, control flow, and data structures. It then moves to larger applications involving code management, object-oriented programming, web development, and converting code from earlier versions of Python.True to his audience of experienced developers, the author covers common programming language features concisely, while giving more detail to those features unique to Python.Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.
See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism
Robert B. Baer - 2002
This riveting book is both an indictment of an agency that lost its way and an unprecedented look at the roots of modern terrorism, and includes a new afterword in which Baer speaks out about the American war on terrorism and its profound implications throughout the Middle East.“Robert Baer was considered perhaps the best on-the-ground field officer in the Middle East.”–Seymour M. Hersh, The New YorkerFrom The PrefaceThis book is a memoir of one foot soldier’s career in the other cold war, the one against terrorist networks. It’s a story about places most Americans will never travel to, about people many Americans would prefer to think we don’t need to do business with.This memoir, I hope, will show the reader how spying is supposed to work, where the CIA lost its way, and how we can bring it back again. But I hope this book will accomplish one more purpose as well: I hope it will show why I am angry about what happened to the CIA. And I want to show why every American and everyone who cares about the preservation of this country should be angry and alarmed, too.The CIA was systematically destroyed by political correctness, by petty Beltway wars, by careerism, and much more. At a time when terrorist threats were compounding globally, the agency that should have been monitoring them was being scrubbed clean instead. Americans were making too much money to bother. Life was good. The White House and the National Security Council became cathedrals of commerce where the interests of big business outweighed the interests of protecting American citizens at home and abroad. Defanged and dispirited, the CIA went along for the ride. And then on September 11, 2001, the reckoning for such vast carelessness was presented for all the world to see.
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
OccupyTheWeb - 2018
Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password crackerHacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?
Some Remarks: Essays and Other Writing
Neal Stephenson - 1994
He’s taken sf to places it’s never been (Snow Crash, Anathem). He’s reinvented the historical novel (The Baroque Cycle), the international thriller (Reamde), and both at the same time (Cryptonomicon).Now he treats his legion of fans to Some Remarks, an enthralling collection of essays—Stephenson’s first nonfiction work since his long essay on technology, In the Beginning…Was the Command Line, more than a decade ago—as well as new and previously published short writings both fiction and non.Some Remarks is a magnificent showcase of a brilliantly inventive mind and talent, as he discourses on everything from Sir Isaac Newton to Star Wars.
Artificial Intelligence: A Guide for Thinking Humans
Melanie Mitchell - 2019
The award-winning author Melanie Mitchell, a leading computer scientist, now reveals AI’s turbulent history and the recent spate of apparent successes, grand hopes, and emerging fears surrounding it.In Artificial Intelligence, Mitchell turns to the most urgent questions concerning AI today: How intelligent—really—are the best AI programs? How do they work? What can they actually do, and when do they fail? How humanlike do we expect them to become, and how soon do we need to worry about them surpassing us? Along the way, she introduces the dominant models of modern AI and machine learning, describing cutting-edge AI programs, their human inventors, and the historical lines of thought underpinning recent achievements. She meets with fellow experts such as Douglas Hofstadter, the cognitive scientist and Pulitzer Prize–winning author of the modern classic Gödel, Escher, Bach, who explains why he is “terrified” about the future of AI. She explores the profound disconnect between the hype and the actual achievements in AI, providing a clear sense of what the field has accomplished and how much further it has to go.Interweaving stories about the science of AI and the people behind it, Artificial Intelligence brims with clear-sighted, captivating, and accessible accounts of the most interesting and provocative modern work in the field, flavored with Mitchell’s humor and personal observations. This frank, lively book is an indispensable guide to understanding today’s AI, its quest for “human-level” intelligence, and its impact on the future for us all.
China's Civilian Army: The Making of Wolf Warrior Diplomacy
Peter Martin - 2021
They give a rare perspective on the greatest geopolitical drama of the last half century.In the early days of the People's Republic, diplomats were highly-disciplined, committed communists who feared revealing any weakness to the threatening capitalist world. Remarkably, the model that revolutionary leader Zhou Enlai established continues to this day despite the massive changes the country has undergone in recent decades.Little is known or understood about the inner workings of the Chinese government as the country bursts onto the world stage, as the world's second largest economy and an emerging military superpower. China's Diplomats embody its battle between insecurity and self-confidence, internally and externally. To this day, Chinese diplomats work in pairs so that one can always watch the other for signs of ideological impurity. They're often dubbed China's "wolf warriors" for their combative approach to asserting Chinese interests.Drawing for the first time on the memoirs of more than a hundred retired diplomats as well as author Peter Martin's first-hand reporting as a journalist in Beijing, this groundbreaking book blends history with current events to tease out enduring lessons about the kind of power China is set to become. It is required reading for anyone who wants to understand China's quest for global power, as seen from the inside.
The Iran Wars: Spy Games, Bank Battles, and the Secret Deals That Reshaped the Middle East
Jay Solomon - 2014
Through a combination of economic sanctions, global diplomacy, and intelligence work, successive U.S. administrations have struggled to contain Iran's aspirations to become a nuclear power and dominate the region--what many view as the most serious threat to peace in the Middle East. Meanwhile, Iran has used regional instability to its advantage to undermine America's interests. The Iran Wars is an absorbing account of a battle waged on many levels--military, financial, and covert.Jay Solomon's book is the product of extensive in-depth reporting and interviews with all the key players in the conflict--from high-ranking Iranian officials to Secretary of State John Kerry and his negotiating team. With a reporter's masterly investigative eye and the narrative dexterity of a great historian, Solomon shows how Iran's nuclear development went unnoticed for years by the international community only to become its top security concern. He catalogs the blunders of both the Bush and Obama administrations as they grappled with how to engage Iran, producing a series of both carrots and sticks. And he takes us inside the hotel suites where the 2015 nuclear agreement was negotiated, offering a frank assessment of the uncertain future of the U.S.-Iran relationship.This is a book rife with revelations, from the secret communications between the Obama administration and the Iranian government to dispatches from the front lines of the new field of financial warfare. For readers of Steve Coll's Ghost Wars and Lawrence Wright's The Looming Tower, The Iran Wars exposes the hidden history of a conflict most Americans don't even realize is being fought, but whose outcome could have far-reaching geopolitical implications.Praise for The Iran Wars "The use of the word 'wars, ' plural, in the title of this illuminating book tells the story: U.S.-Iranian relations have been troubled for many years. This deeply researched account of negotiations and their implications makes an important contribution to understanding the short- and long-term consequences of how we manage this difficult relationship."--George P. Shultz, former secretary of state "An illuminating, deeply reported account from one of the best journalists writing about the Middle East today. Jay Solomon's The Iran Wars offers a front-row view of the spy games, assassinations, political intrigue and high-stakes diplomacy that have defined relations with one of America's most cunning and dangerous foes."--Joby Warrick, Pulitzer Prize-winning author of Black Flags: The Rise of ISIS "A thorough yet concise survey of Iran's buildup of nuclear technology since the 1980s, its troubling exporting of Shiite insurgency in countries around it, and the changing American reaction. Wall Street Journal chief foreign affairs correspondent [Jay] Solomon offers an evenhanded look at the backdoor schemes involving the building of Iran's nuclear weapons and the world players involved in and against its machinations."--Kirkus Reviews (Starred Review)
How America Lost Its Secrets: Edward Snowden, the Man and the Theft
Edward Jay Epstein - 2017
After details of American government surveillance were published in 2013, Edward Snowden, formerly a subcontracted IT analyst for the NSA, became the center of an international controversy: Was he a hero, traitor, whistle-blower, spy? Was his theft legitimized by the nature of the information he exposed? When is it necessary for governmental transparency to give way to subterfuge? Edward Jay Epstein brings a lifetime of journalistic and investigative acumen to bear on these and other questions, delving into both how our secrets were taken and the man who took them. He makes clear that by outsourcing parts of our security apparatus, the government has made classified information far more vulnerable; how Snowden sought employment precisely where he could most easily gain access to the most sensitive classified material; and how, though he claims to have acted to serve his country, Snowden is treated as a prized intelligence asset in Moscow, his new home."
Worthy Fights: A Memoir of Leadership in War and Peace
Leon Panetta - 2014
His first career, beginning as an army intelligence officer and including a distinguished run as one of Congress’s most powerful and respected members, lasted thirty-five years and culminated in his transformational role as Clinton’s budget czar and White House chief of staff. He then “retired” to establish the Panetta Institute with his wife of fifty years, Sylvia; to serve on the Iraq Study Group; and to protect his beloved California coastline. But in 2009, he accepted what many said was a thankless task: returning to public office as the director of the CIA, taking it from a state of turmoil after the Bush-era torture debates and moving it back to the vital center of America’s war against Al Qaeda, including the campaign that led to the killing of Osama bin Laden. And then, in the wake of bin Laden’s death, Panetta became the U.S. secretary of defense, inheriting two troubled wars in a time of austerity and painful choices.Like his career, Worthy Fights is a reflection of Panetta’s values. It is imbued with the frank, grounded, and often quite funny spirit of a man who never lost touch with where he came from: his family’s walnut farm in beautiful Carmel Valley, California. It is also a testament to a lost kind of political leadership, which favors progress and duty to country over partisanship. Panetta is a Democrat who pushed for balanced budgets while also expanding care for the elderly and sick; a devout Catholic who opposes the death penalty but had to weigh every drone strike from 2009 through 2011. Throughout his career, Panetta’s polestar has been his belief that a public servant’s real choice is between leadership or crisis. Troubles always come about through no fault of one’s own, but most can be prevented with courage and foresight.As always, Panetta calls them as he sees them in Worthy Fights. Suffused with its author’s decency and stubborn common sense, the book is an epic American success story, a great political memoir, and a revelatory view onto many of the great figures and events of our time.
From Silk to Silicon: The Story of Globalization Through Ten Extraordinary Lives
Jeffrey E. Garten - 2016
From Silk to Silicon tells the story of who these men and women were, what they did, how they did it and how their achievements continue to shape our world today. They include:• Genghis Khan, who united east and west by conquest and by opening new trade routes built on groundbreaking transportation, communications, and management innovations.• Mayer Amschel Rothschild, who arose from an oppressive Jewish ghetto to establish the most powerful bank the world has seen, and ushered in an era of global finance.• Cyrus Field, who became the father of global communications by leading the effort to build the transatlantic telegraph, the forerunner to global radio, TV, and the worldwide Internet.• Margaret Thatcher, whose controversial policies opened the gusher of substantially free markets that linked economies across borders.• Andy Grove, a Hungarian refugee from the Nazis who built the company—Intel—that figured out how to manufacture complex computer chips on a mass, commercial scale and laid the foundation for Silicon Valley’s computer revolution.Through these stories Jeffrey E. Garten finds the common links between these figure and probes critical questions including: How much influence can any one person have in fundamentally changing the world? And how have past trends in globalization affected the present and how will they shape the future? From Silk to Silicon is an essential book to understanding the past—and the future—of the most powerful force of our times.